top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers / / edited by Stefan Mangard, Axel Y. Poschmann
Constructive Side-Channel Analysis and Secure Design [[electronic resource] ] : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers / / edited by Stefan Mangard, Axel Y. Poschmann
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 271 p. 87 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer security
Management information systems
Computer science
Algorithms
Computer science—Mathematics
Cryptology
Computer Communication Networks
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-21476-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side-Channel Attacks -- Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements -- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) -- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits -- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks -- Two Operands of Multipliers in Side-Channel Attack -- FPGA Countermeasures -- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs -- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware -- Timing Attacks and Countermeasures -- A Faster and More Realistic Flush+Reload Attack on AES -- Faster software for fast endomorphisms -- Toward Secure Implementation of McEliece Decryption -- Fault Attacks -- Fault Injection with a new favor: Memetic Algorithms make a difference -- Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers -- A Biased Fault Attack on the Time Redundancy Countermeasure for AES -- Countermeasures -- Faster Mask Conversion with Lookup Tables -- Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC -- Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs -- Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment.
Record Nr. UNISA-996204581803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Constructive Side-Channel Analysis and Secure Design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers / / edited by Stefan Mangard, Axel Y. Poschmann
Constructive Side-Channel Analysis and Secure Design : 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers / / edited by Stefan Mangard, Axel Y. Poschmann
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 271 p. 87 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer security
Management information systems
Computer science
Algorithms
Computer science—Mathematics
Cryptology
Computer Communication Networks
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-319-21476-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Side-Channel Attacks -- Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements -- Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) -- Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits -- Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks -- Two Operands of Multipliers in Side-Channel Attack -- FPGA Countermeasures -- Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs -- Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware -- Timing Attacks and Countermeasures -- A Faster and More Realistic Flush+Reload Attack on AES -- Faster software for fast endomorphisms -- Toward Secure Implementation of McEliece Decryption -- Fault Attacks -- Fault Injection with a new favor: Memetic Algorithms make a difference -- Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers -- A Biased Fault Attack on the Time Redundancy Countermeasure for AES -- Countermeasures -- Faster Mask Conversion with Lookup Tables -- Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC -- Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs -- Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment.
Record Nr. UNINA-9910484333203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptographic Hardware and Embedded Systems -- CHES 2010 [[electronic resource] ] : 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings / / edited by Stefan Mangard, Francois-Xavier Standaert
Cryptographic Hardware and Embedded Systems -- CHES 2010 [[electronic resource] ] : 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings / / edited by Stefan Mangard, Francois-Xavier Standaert
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 458 p. 142 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Data structures (Computer science)
Computer security
Algorithms
Computer science—Mathematics
Cryptology
Coding and Information Theory
Data Structures and Information Theory
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-642-15031-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Low Cost Cryptography -- Quark: A Lightweight Hash -- PRINTcipher: A Block Cipher for IC-Printing -- Sponge-Based Pseudo-Random Number Generators -- Efficient Implementations I -- A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over -- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves -- Efficient Techniques for High-Speed Elliptic Curve Cryptography -- Side-Channel Attacks and Countermeasures I -- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 -- New Results on Instruction Cache Attacks -- Correlation-Enhanced Power Analysis Collision Attack -- Side-Channel Analysis of Six SHA-3 Candidates -- Tamper Resistance and Hardware Trojans -- Flash Memory ‘Bumping’ Attacks -- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection -- When Failure Analysis Meets Side-Channel Attacks -- Efficient Implementations II -- Fast Exhaustive Search for Polynomial Systems in -- 256 Bit Standardized Crypto for 650 GE – GOST Revisited -- Mixed Bases for Efficient Inversion in and Conversion Matrices of SubBytes of AES -- SHA-3 -- Developing a Hardware Evaluation Method for SHA-3 Candidates -- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs -- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures -- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework -- Fault Attacks and Countermeasures -- Public Key Perturbation of Randomized RSA Implementations -- Fault Sensitivity Analysis -- PUFs and RNGs -- An Alternative to Error Correction for SRAM-Like PUFs -- New High Entropy Element for FPGA Based True Random Number Generators -- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes -- New Designs -- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs -- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware -- Side-Channel Attacks and Countermeasures II -- Provably Secure Higher-Order Masking of AES -- Algebraic Side-Channel Analysis in the Presence of Errors -- Coordinate Blinding over Large Prime Fields.
Record Nr. UNISA-996466292203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptographic hardware and embedded systems--CHES 2010 : 12th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings / / Stefan Mangard, Francois-Xavier Standaert (eds.)
Cryptographic hardware and embedded systems--CHES 2010 : 12th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings / / Stefan Mangard, Francois-Xavier Standaert (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XIII, 458 p. 142 illus.)
Disciplina 005.8
Altri autori (Persone) MangardStefan
StandaertFrancois-Xavier
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Embedded computer systems
Cryptography
Computer security
ISBN 3-642-15031-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Low Cost Cryptography -- Quark: A Lightweight Hash -- PRINTcipher: A Block Cipher for IC-Printing -- Sponge-Based Pseudo-Random Number Generators -- Efficient Implementations I -- A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over -- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves -- Efficient Techniques for High-Speed Elliptic Curve Cryptography -- Side-Channel Attacks and Countermeasures I -- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 -- New Results on Instruction Cache Attacks -- Correlation-Enhanced Power Analysis Collision Attack -- Side-Channel Analysis of Six SHA-3 Candidates -- Tamper Resistance and Hardware Trojans -- Flash Memory ‘Bumping’ Attacks -- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection -- When Failure Analysis Meets Side-Channel Attacks -- Efficient Implementations II -- Fast Exhaustive Search for Polynomial Systems in -- 256 Bit Standardized Crypto for 650 GE – GOST Revisited -- Mixed Bases for Efficient Inversion in and Conversion Matrices of SubBytes of AES -- SHA-3 -- Developing a Hardware Evaluation Method for SHA-3 Candidates -- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs -- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures -- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework -- Fault Attacks and Countermeasures -- Public Key Perturbation of Randomized RSA Implementations -- Fault Sensitivity Analysis -- PUFs and RNGs -- An Alternative to Error Correction for SRAM-Like PUFs -- New High Entropy Element for FPGA Based True Random Number Generators -- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes -- New Designs -- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs -- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware -- Side-Channel Attacks and Countermeasures II -- Provably Secure Higher-Order Masking of AES -- Algebraic Side-Channel Analysis in the Presence of Errors -- Coordinate Blinding over Large Prime Fields.
Altri titoli varianti CHES 2010
Record Nr. UNINA-9910484204303321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Radio Frequency Identification [[electronic resource] ] : 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers / / edited by Stefan Mangard, Patrick Schaumont
Radio Frequency Identification [[electronic resource] ] : 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers / / edited by Stefan Mangard, Patrick Schaumont
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 175 p. 57 illus.)
Disciplina 621
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
E-commerce
Systems and Data Security
Cryptology
Computer Communication Networks
e-Commerce/e-business
ISBN 3-319-24837-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PUFs and Applications -- RFID System Attacks -- Efficient Implementations.
Record Nr. UNISA-996466304303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Radio Frequency Identification : 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers / / edited by Stefan Mangard, Patrick Schaumont
Radio Frequency Identification : 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers / / edited by Stefan Mangard, Patrick Schaumont
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 175 p. 57 illus.)
Disciplina 621
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
E-commerce
Systems and Data Security
Cryptology
Computer Communication Networks
e-Commerce/e-business
ISBN 3-319-24837-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto PUFs and Applications -- RFID System Attacks -- Efficient Implementations.
Record Nr. UNINA-9910482964103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications [[electronic resource] ] : 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers / / edited by Stefan Mangard
Smart Card Research and Advanced Applications [[electronic resource] ] : 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers / / edited by Stefan Mangard
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 297 p. 98 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Software engineering
Computer security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Software Engineering
Systems and Data Security
ISBN 3-642-37288-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection -- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks with Localization-Agnostic Fault -- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards -- On the Use of Shamir’s Secret Sharing against Side-Channel Analysis -- Secure Multiple SBoxes Implementation with Arithmetically Masked Input -- Low-Cost Countermeasure against RPA -- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models -- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices -- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices -- Putting together What Fits together - GrÆStl -- Memory Access Pattern Protection for Resource-Constrained Devices -- Multipurpose Cryptographic Primitive ARMADILLO3 -- Improving Side-Channel Analysis with Optimal Linear Transforms -- SCA with Magnitude Squared Coherence -- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis -- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines -- Defensive Leakage Camouflage.
Record Nr. UNISA-996465573003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Card Research and Advanced Applications : 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers / / edited by Stefan Mangard
Smart Card Research and Advanced Applications : 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers / / edited by Stefan Mangard
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 297 p. 98 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Software engineering
Computer security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Software Engineering
Systems and Data Security
ISBN 3-642-37288-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Towards the Hardware Accelerated Defensive Virtual Machine – Type and Bound Protection -- Dynamic Fault Injection Countermeasure: A New Conception of Java Card Security -- Java Card Combined Attacks with Localization-Agnostic Fault -- Improved (and Practical) Public-Key Authentication for UHF RFID. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards -- On the Use of Shamir’s Secret Sharing against Side-Channel Analysis -- Secure Multiple SBoxes Implementation with Arithmetically Masked Input -- Low-Cost Countermeasure against RPA -- Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models -- On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices -- Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices -- Putting together What Fits together - GrÆStl -- Memory Access Pattern Protection for Resource-Constrained Devices -- Multipurpose Cryptographic Primitive ARMADILLO3 -- Improving Side-Channel Analysis with Optimal Linear Transforms -- SCA with Magnitude Squared Coherence -- Strengths and Limitations of High-Resolution Electromagnetic Field Measurements for Side-Channel Analysis -- Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines -- Defensive Leakage Camouflage.
Record Nr. UNINA-9910483355603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui